Authentication protocol

Results: 881



#Item
1

Verification of Integrity and Secrecy Properties of a Biometric Authentication Protocol A. Salaiwarakul and M.D.Ryan School of Computer Science, University of Birmingham, UK {A.Salaiwarakul, M.D.Ryan}@cs.bham.ac.uk

Add to Reading List

Source URL: www.cs.bham.ac.uk.

Language: English - Date: 2009-02-25 10:33:23
    2

    Lapin: An Efficient Authentication Protocol Based on Ring-LPN Stefan Heyse1 , Eike Kiltz1 , Vadim Lyubashesvky2 , Christof Paar1 , and Krzysztof Pietrzak3? 1 Ruhr-Universit¨at Bochum

    Add to Reading List

    Source URL: www.iacr.org

    - Date: 2012-03-01 05:54:47
      3

      A Bi-direction Authentication Protocol for RFID Based on the Variable Update in IOT† Liu Yang1,2*, Peng Yu 2,Wang Bailing 1, Qu Yun1, Yuan Xinling 1,Yin zelong1 1 Department of Computer Science & Technology Harbin Inst

      Add to Reading List

      Source URL: onlinepresent.org

      - Date: 2013-04-22 21:08:07
        4

        Arista v. Cisco Request 15 Oct 15 Authentication requested for: RFC 2401 Security Architecture for the Internet Protocol

        Add to Reading List

        Source URL: iaoc.ietf.org

        - Date: 2015-11-01 16:21:27
          5

          Analysis of EAP-GPSK Authentication Protocol John C. Mitchell1 , Arnab Roy1 and Paul Rowe2 , Andre Scedrov2 1 2

          Add to Reading List

          Source URL: theory.stanford.edu

          - Date: 2010-03-09 22:02:41
            6Computing / Directory services / Computer access control / Software / Computer security / Internet Standards / Internet protocols / Access control / Lightweight Directory Access Protocol / Authentication / Security Support Provider Interface / Password

            PDF Document

            Add to Reading List

            Source URL: www.inforouter.com

            Language: English - Date: 2015-03-26 12:13:27
            7Computing / Cryptography / Computer security / Internet protocols / Computer access control / Internet Standards / Code division multiple access / Computer network security / Diameter protocol / Authentication protocol / RADIUS / OAuth

            Introduction to centralized Authentication, Authorization and Accounting (AAA) management for distributed IP networks IETF 89 - Tutorials London, England

            Add to Reading List

            Source URL: ietf.org

            Language: English - Date: 2014-03-02 06:27:58
            8Employment / Business / Personal life / Supervisor / Anger / Employee relations / Employee assistance program / Extensible Authentication Protocol

            BB Frontline Supervisorpub

            Add to Reading List

            Source URL: gato-docs.its.txstate.edu

            Language: English - Date: 2016-08-20 06:33:20
            9Computing / Computer access control / Web standards / Cryptographic protocols / Remote procedure call / SOAP / Hypertext Transfer Protocol / Web services / Web Services Description Language / 3-D Secure / Security token / Authentication

            Technical Implementation Guide WebServices V5 Systempay 2.5 Document version 1.5

            Add to Reading List

            Source URL: systempay.cyberpluspaiement.com

            Language: English - Date: 2015-12-16 04:48:58
            10Wireless networking / IEEE 802 / IEEE 802.11 / IEEE 802.21 / Extensible Authentication Protocol / Computing / Station / Institute of Electrical and Electronics Engineers / Technology

            March 2007 doc.: IEEE0476r1 IEEE P802.11 Wireless LANs Liaison Response to IETF ECRIT Date:

            Add to Reading List

            Source URL: mentor.ieee.org

            Language: English - Date: 2011-06-28 18:41:54
            UPDATE